Tutorial quote: Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission.

Tutorial quote: This tutorial shows how you can set up a Mandriva One 2010.1 Spring desktop (with the GNOME desktop environment) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

Tutorial quote: This document describes how to set up a CentOS 5.1 desktop. It provides all you need for daily work and entertainment, incl. multimedia codecs, Adobe Flash, Adobe Reader, Skype, TrueType fonts, VMware Server, ntfs-3g, Sun Java, and many more.

Tutorial quote: If you want to use nginx and PHP-FPM for shared hosting environments, you should make up your mind about security. In Apache/PHP environments, you can use suExec and/or suPHP to make PHP execute under individual user accounts instead of a system user like www-data. There's no such thing for PHP-FPM, but fortunately PHP-FPM allows us to set up a "pool" for each web site that makes PHP scripts execute as the user/group defined in that pool. This gives you all the benefits of suPHP, and in addition to that you don't have any FTP or SCP transfer problems because PHP scripts don't need to be owned by a specific user/group to be executed as the user/group defined in the pool.

Tutorial quote: This tutorial provides step-by-step instructions about how to install Xen (version 3.0.3) on a Debian Sarge (3.1) system. It shows how to compile Xen, dom0 and domU kernels from the sources as well as how to install Xen from precompiled binaries. Creating guest domains from images is also covered by this article.

Tutorial quote: This tutorial shows how you can set up a Mandriva One 2008 Spring (Mandriva 2008.1) desktop (with the KDE desktop environment) that is a full-fledged replacement for a Windows desktop, i.e. that has all the software that people need to do the things they do on their Windows desktops. The advantages are clear: you get a secure system without DRM restrictions that works even on old hardware, and the best thing is: all software comes free of charge.

Tutorial quote: A graphical tool to make file backup simpler. Provides a user-friendly interface which allows you to back up your files easily to an archive, to a CD/DVD or to a remote location using SSH.pybackpack is a user-friendly file backup tool written for the Gnome desktop and released under the GPL.

Tutorial quote: Are you looking for a solution to backup your data to a remote location? While a solid backup solution such as Arkeia or TSM from IBM are nice from an enterprise point of view, simpler solutions are available from a home user's perspective. I will walk you through on you how you can backup your data to a remote server, using the default tools available on all linux systems. In a nutshell, we will use ssh capabilities to allow a cron job to transfer a tarball from you local machine to a remote machine.

For the purpose of this tutorial, the local machine will be called â€ślocalmachineâ€ť (running slackware) and the remote server will be called â€śremoteserverâ€ť (slackware as well). The user will be joe (me). You will have to substitute those 3 with your own machines names and user.

Tutorial quote: This tutorial explains how to set up PHPIDS on a web server with Apache2 and PHP5. PHPIDS (PHP-Intrusion Detection System) is a simple to use, well structured, fast and state-of-the-art security layer for your PHP based web application. The IDS neither strips, sanitizes nor filters any malicious input, it simply recognizes when an attacker tries to break your site and reacts in exactly the way you want it to. Based on a set of approved and heavily tested filter rules any attack is given a numerical impact rating which makes it easy to decide what kind of action should follow the hacking attempt. This could range from simple logging to sending out an emergency mail to the development team, displaying a warning message for the attacker or even ending the user’s session.

Tutorial quote: In this tutorial I will describe how to set up a highly available NFS server that can be used as storage solution for other high-availability services like, for example, a cluster of web servers that are being loadbalanced. If you have a web server cluster with two or more nodes that serve the same web site(s), than these nodes must access the same pool of data so that every node serves the same data, no matter if the loadbalancer directs the user to node 1 or node n. This can be achieved with an NFS share on an NFS server that all web server nodes (the NFS clients) can access.

As we do not want the NFS server to become another "Single Point of Failure", we have to make it highly available. In fact, in this tutorial I will create two NFS servers that mirror their data to each other in realtime using DRBD and that monitor each other using heartbeat, and if one NFS server fails, the other takes over silently. To the outside (e.g. the web server nodes) these two NFS servers will appear as a single NFS server.

In this setup I will use Debian Sarge (3.1) for the two NFS servers as well as for the NFS client (which represents a node of the web server cluster).